Assessment, Authorization, and Monitoring (CA)

Employ a joint authorization process for the system that includes multiple authorizing officials from the same organization conducting the authorization.


Login

Assessment, Authorization, and Monitoring (CA)

Employ a joint authorization process for the system that includes multiple authorizing officials with at least one authorizing official from an organization external to the organization conducting the authorization.


Login

Assessment, Authorization, and Monitoring (CA)

Develop a system-level continuous monitoring strategy and implement continuous monitoring in accordance with the organization-level continuous monitoring strategy that includes: a. Establishing the following system-level metrics to be monitored: [Assignment: organization-defined system-level metrics]; b. Establishing [Assignment: organization-defined frequencies] for monitoring and [Assignment: organization-defined frequencies] for assessment of control effectiveness; c. Ongoing control assessments in accordance with the continuous monitoring strategy; d. Ongoing monitoring of system and organization-defined metrics in accordance with the continuous monitoring strategy; e. Correlation and analysis of information generated by control assessments and monitoring; f. Response actions to address results of the analysis of control assessment and monitoring information; and g. Reporting the security and privacy status of the system to [Assignment: organization-defined personnel or roles] [Assignment: organization-defined frequency].


Login

Assessment, Authorization, and Monitoring (CA)

Employ independent assessors or assessment teams to monitor the controls in the system on an ongoing basis.


Login

Assessment, Authorization, and Monitoring (CA)

[Withdrawn: Incorporated into CA-2.]


Login

Assessment, Authorization, and Monitoring (CA)

Employ trend analyses to determine if control implementations, the frequency of continuous monitoring activities, and the types of activities used in the continuous monitoring process need to be modified based on empirical data.


Login

Assessment, Authorization, and Monitoring (CA)

Ensure risk monitoring is an integral part of the continuous monitoring strategy that includes the following: (a) Effectiveness monitoring; (b) Compliance monitoring; and (c) Change monitoring.


Login

Assessment, Authorization, and Monitoring (CA)

Employ the following actions to validate that policies are established and implemented controls are operating in a consistent manner: [Assignment: organization-defined actions].


Login

Assessment, Authorization, and Monitoring (CA)

Ensure the accuracy, currency, and availability of monitoring results for the system using [Assignment: organization-defined automated mechanisms].


Login

Assessment, Authorization, and Monitoring (CA)

Conduct penetration testing [Assignment: organization-defined frequency] on [Assignment: organization-defined systems or system components].


Login